Cisco Acs 5x User Guide
Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.
Page 191
8-39 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Figure 8-5 Test Bind to Server Dialog Box For more information, see Creating External LDAP Identity Stores, page 8-26. NoteThe default password for LDAP is GBSbeacon. If you want to change this password, refer to the Cisco NAC Profiler Installation and Configuration Guide at the following location:...
Page 192
8-40 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Number of Subjects: 100 Number of Directory Groups: 6 Figure 8-7 Test Configuration Dialog Box Number of Subjects—This value maps to the actual subject devices already profiled by the Cisco NAC Profiler (actual devices enabled for Profiler). After the Profiler receives initial SNMP trap information from the switch, Profiler can poll the switch...
Page 193
8-41 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores For more information on features like Event Delivery Method and Active Response, see the Cisco NAC Profiler Installation and Configuration Guide, Release 3.1 at the following location: http://www.cisco.com/en/US/docs/security/nac/profiler/configuration_guide/310/p_prof_events31.html Troubleshooting MAB Authentication with Profiler Integration To...
Page 194
8-42 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores The AD user password change using the above methods must follow the AD password policy. You must check with your AD administrator to know the complete AD password policy rule. AD password policy important rules are: Enforce password history N passwords remembered Maximum password age N days Minimum password age N days Minimum password length N...
Page 195
8-43 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores If there is a firewall between ACS and AD, certain ports need to be opened in order to allow ACS to communicate with AD. The following are the default ports to be opened: NoteDial-in users are not supported by AD in ACS. This section contains the following topics: Machine Authentication, page 8-43 Attribute Retrieval for Authorization, page 8-44...
Page 196
8-44 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Attribute Retrieval for Authorization You can configure ACS to retrieve user or machine AD attributes to be used in authorization and group mapping rules. The attributes are mapped to the ACS policy results and determine the authorization level for the user or machine. ACS retrieves user and machine AD attributes after a successful user or machine...
Page 197
8-45 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Machine Access Restrictions MAR helps tying the results of machine authentication to user authentication and authorization process. The most common usage of MAR is to fail authentication of users whose host machine does not successfully authenticate. The MAR is effective for all authentication protocols. MAR functionality is based on the following...
Page 198
8-46 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores The Engineers rule is an example of MAR rule that only allows engineers access if their machine was successfully authenticated against windows DB. The Managers rule is an example of an exemption from MAR. Dial-in Permissions The dial-in permissions of a user are checked during authentications or queries from Active Directory. The dial-in check is...
Page 199
8-47 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Dial-in Support Attributes The user attributes on Active Directory are supported on the following servers: Windows server 2003 Windows server 2003 R2 Windows server 2008 Windows server 2008 R2 ACS does not support Dial-in users on Windows 2000. ACS Response If you enable the dial-in check on ACS Active Directory and the users dial-in option is Deny...
Page 200
8-48 User Guide for Cisco Secure Access Control System 5.3 OL-24201-01 Chapter 8 Managing Users and Identity Stores Managing External Identity Stores Joining ACS to an AD Domain After you configure the AD identity store in ACS through the ACS web interface, you must submit the configuration to join ACS to the AD domain. For more information on how to configure an AD identity store, see Configuring an AD Identity Store, page 8-48. NoteThe Windows AD account, which joins ACS to the AD domain, can...